]> git.proxmox.com Git - mirror_ubuntu-kernels.git/commitdiff
iommu/amd: Set page size bitmap during V2 domain allocation
authorJerry Snitselaar <jsnitsel@redhat.com>
Tue, 4 Apr 2023 07:27:42 +0000 (00:27 -0700)
committerStefan Bader <stefan.bader@canonical.com>
Fri, 7 Jul 2023 10:17:09 +0000 (12:17 +0200)
BugLink: https://bugs.launchpad.net/bugs/2025067
[ Upstream commit 8f880d19e6ad645a4b8066d5ff091c980b3231e7 ]

With the addition of the V2 page table support, the domain page size
bitmap needs to be set prior to iommu core setting up direct mappings
for reserved regions. When reserved regions are mapped, if this is not
done, it will be looking at the V1 page size bitmap when determining
the page size to use in iommu_pgsize(). When it gets into the actual
amd mapping code, a check of see if the page size is supported can
fail, because at that point it is checking it against the V2 page size
bitmap which only supports 4K, 2M, and 1G.

Add a check to __iommu_domain_alloc() to not override the
bitmap if it was already set by the iommu ops domain_alloc() code path.

Cc: Vasant Hegde <vasant.hegde@amd.com>
Cc: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
Cc: Robin Murphy <robin.murphy@arm.com>
Cc: Will Deacon <will@kernel.org>
Cc: Joerg Roedel <joro@8bytes.org>
Fixes: 4db6c41f0946 ("iommu/amd: Add support for using AMD IOMMU v2 page table for DMA-API")
Signed-off-by: Jerry Snitselaar <jsnitsel@redhat.com>
Reviewed-by: Vasant Hegde <vasant.hegde@amd.com>
Link: https://lore.kernel.org/r/20230404072742.1895252-1-jsnitsel@redhat.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
drivers/iommu/amd/iommu.c
drivers/iommu/iommu.c

index ff4f3d4da340281e4ab7cb16a155b65a1cd89b59..e108280fdaa0ee8905ff556a44760d73d89ef512 100644 (file)
@@ -1656,10 +1656,6 @@ static void do_attach(struct iommu_dev_data *dev_data,
        domain->dev_iommu[iommu->index] += 1;
        domain->dev_cnt                 += 1;
 
-       /* Override supported page sizes */
-       if (domain->flags & PD_GIOV_MASK)
-               domain->domain.pgsize_bitmap = AMD_IOMMU_PGSIZES_V2;
-
        /* Update device table */
        set_dte_entry(iommu, dev_data->devid, domain,
                      ats, dev_data->iommu_v2);
@@ -2038,6 +2034,8 @@ static int protection_domain_init_v2(struct protection_domain *domain)
 
        domain->flags |= PD_GIOV_MASK;
 
+       domain->domain.pgsize_bitmap = AMD_IOMMU_PGSIZES_V2;
+
        if (domain_enable_v2(domain, 1)) {
                domain_id_free(domain->id);
                return -ENOMEM;
index f8100067502fb3a65360b70acbfaefec4b47e2a4..e6f2a0bc9f0be1659d6ce3c4937b53307c321bf8 100644 (file)
@@ -1940,8 +1940,13 @@ static struct iommu_domain *__iommu_domain_alloc(struct bus_type *bus,
                return NULL;
 
        domain->type = type;
-       /* Assume all sizes by default; the driver may override this later */
-       domain->pgsize_bitmap = bus->iommu_ops->pgsize_bitmap;
+       /*
+        * If not already set, assume all sizes by default; the driver
+        * may override this later
+        */
+       if (!domain->pgsize_bitmap)
+               domain->pgsize_bitmap = bus->iommu_ops->pgsize_bitmap;
+
        if (!domain->ops)
                domain->ops = bus->iommu_ops->default_domain_ops;